Domain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
Answer: B
A vulnerability is a lack of a countermeasure or a weakness in a
countermeasure that is in place. A threat is any potential danger
that is associated with the exploitation of a vulnerability. The threat
is that someone, or something, will identify a specific vulnerability
and use it against the company or individual. A risk is the likelihood
of a threat agent exploiting a vulnerability and the corresponding
business impact.
Answer: B
Intangible asset value is challenging to determine. While there are
several ways to determine the value of an intangible asset, the best
approach involves seeking assistance from finance or accounting
professionals to determine the impact of the asset to the
organization.
3. Qualitative risk assessment is
earmarked by which of the
following? A. Ease of implementation
and it can be completed by personnel
with a limited understanding of the risk
assessment process
B. Can be completed by personnel with a limited
understanding of the risk assessment process and
uses detailed metrics used for calculation of risk
C. Detailed metrics used for calculation of risk and
ease of implementation
D. Can be completed by personnel with a limited
understanding of the risk assessment process and
detailed metrics used for the calculation of risk
Answer: A
Qualitative risk assessments are a form of risk assessments that use
stratified forms of risk such as “high, moderate and low.” This
simplified approach allows for those not as familiar with risk
assessments the ability to perform risk assessments, which while
not as specific as quantitative assessments are still meaningful.
Answer: C
The formula for calculating SLE is SLE = asset value (in $) ×
exposure factor (loss in successful threat exploit, as %).
Answer: D
It is expected that an organization will make a selection of the risk
assessment methodology, tools, and resources (including people)
that best fit its culture, personnel capabilities, budget, and timeline.
Answer: B
Security awareness training is a method by which organizations can
inform employees about their roles, and expectations surrounding
their roles, in the observance of information security requirements.
Additionally, training provides guidance surrounding the
performance of particular security or risk management functions, as
well as providing information surrounding the security and risk
management functions in general.
Answer: D
Due diligence is the act of investigating and understanding the risks
the company faces. A company practices due care by developing
security policies, procedures, and standards. Due care shows that a
company has taken responsibility for the activities that take place
within the corporation and has taken the necessary steps to help
protect the company, its resources, and employees from possible
risks. So due diligence is understanding the current threats and
risks and due care is implementing countermeasures to provide
protection from those threats. If a company does not practice due
care and due diligence pertaining to the security of its assets, it can
be legally charged with negligence and held accountable for any
ramifications of that negligence.
Answer: B
There will always be residual risk accepted by an organization,
and effective security management will minimize this risk to a level
that fits within the organization’s risk tolerance or risk profile.
Answer: D
Availability is the principle that information is available and
accessible by users when needed. The two primary areas affecting
the availability of systems are (1) denial of service attacks and (2)
loss of service due to a disaster, which could be man-made or
natural.
Answer: D
Business continuity planning (BCP) and Disaster recovery planning
(DRP) address the preparation, processes, and practices required to
ensure the preservation of the business in the face of major
disruptions to normal business operations.
1. Gathering information;
2. Performing a vulnerability assessment;
3. Analyzing the information; and
4. Documenting the results and presenting the
recommendations.
The initial step of the BIA is identifying which business units are
critical to continuing an acceptable level of operations.
Answer: D
Tactical plans provide the broad initiatives to support and achieve
the goals specified in the strategic plan. These initiatives may
include deployments such as establishing an electronic policy
development and distribution process, implementing robust change
control for the server environment, reducing vulnerabilities residing
on the servers using vulnerability management, implementing a
“hot site” disaster recovery program, or implementing an identity
management solution. These plans are more specific and may
consist of multiple projects to complete the effort. Tactical plans are
shorter in length, such as 6 to 18 months to achieve a specific
security goal of the company.
Answer: C
The security officer must work with the application development
managers to ensure that security is considered in the project cost
during each phase of development (analysis, design, development,
testing, implementation, and post implementation). To facilitate this
best from an independence perspective, the security officer should
not report to application development.
Answer: D
Security is much less expensive when it is built into the application
design versus added as an afterthought at or after implementation.
16. Information systems auditors help the
organization:
A. Mitigate compliance issues
B. Establish an effective control environment
C. Identify control gaps
D. Address information technology for financial
statements
Answer: C
Auditors provide an essential role for maintaining and improving
information security. They provide an independent view of the
design, effectiveness, and implementation of controls. The results of
audits generate findings that require management response and
corrective action plans to resolve the issue and mitigate the risk.
Answer: A
Policies should survive two or three years even though they should
be reviewed and approved at least annually.
Answer: C
An organization will conduct a risk assessment (the term risk
analysis is sometimes interchanged with risk assessment) to
evaluate:
Answer: D
Technical implementation details do not belong in a policy. Policies
must be written
technology independent. Technology controls may change over time
as an organization’s risk profile changes and new vulnerabilities are
found.
Answer: B
Separation of duties ensures fraud or other undesirable behavior
cannot occur without collusion between two or more parties. In this
example, individuals could add himself or herself as a vendor and
then pay themselves.
Answer: B
Data owners are ultimately responsible for the information and
therefore should determine access decisions.
Answer: A
Business continuity planning and Disaster recovery planning involve
the identification, selection, implementation, testing, and updating
of prudent processes and specific actions necessary to protect
critical business processes from the effects of major system and
network disruptions and to ensure the timely restoration of
business operations if significant disruptions occur.
25. Business impact analysis is performed to BEST
identify:
A. The impacts of a threat to the organization
operations.
B. The exposures to loss to the organization.
C. The impacts of a risk on the organization.
D. The cost efficient way to eliminate threats.
Answer: B
The business impact analysis is what is going to help the company
decide what needs to be recovered and how quickly it needs to be
recovered.
Answer: D
The third element of risk is mitigating factors. Mitigating factors are
the controls or safeguards the planner will put in place to reduce
the impact of a threat.
Answer: C
Preventing a disaster is always better than trying to recover from
one. If the planner can recommend controls to be put in place to
prevent the most likely of risks from having an impact on the
organization’s ability to do business, then the planner will have
fewer actual events to recover from.
Answer: D
All business functions and the technology that supports them need
to be classified based on their recovery priority. Recovery time
frames for business operations are driven by the consequences of
not performing the function. The consequences may be the result of
business lost during the down period; contractual commitments not
met resulting in fines or lawsuits, lost goodwill with customers, etc.
29. The term “disaster recovery” refers to the recovery
of: A. organization operations.
B. technology environment.
C. manufacturing environment.
D. personnel environments.
Answer: B
Once computers became part of the business landscape, it quickly
became clear that we could not return to our manual processes if
our computers failed. If those computer systems failed, there were
not enough people to do the work nor did the people in the
business still have the skill to do it manually anymore. Th is was the
start of the disaster recovery industry. Still today, the term “disaster
recovery” or “DR” commonly means recovery of the technology
environment.
Answer: A
The BIA is what is going to help the company decide what needs to
be recovered and how quickly it needs to be recovered.
31. The elements of risk are as follows:
A. Natural disasters and manmade disasters
B. Threats, assets and mitigating controls
C. Risk and business impact analysis
D. business impact analysis and mitigating controls
Answer: B
There are three elements of risk: threats, assets, and mitigating
factors.
Answer: D
The only difference between a simulated and an actual exercise is
that the first rule of testing is the planner will never create a disaster
by testing for one. The planner must make every effort to make
certain that what is being tested will not impact the production
environment whether business or technical.
Answer: D
The plan document and all related procedures will need to be
updated after each exercise and after each material change to the
production, IT, or business environment.
Answer: A
Without senior leadership support it is unlikely a business continuity
program will succeed.
Answer: C
Conflicts are resolved through the order of the canons.
Domain 2 – Asset Security
1. In the event of a security incident, one of the
primary objectives of the operations staff is to
ensure that
A. the attackers are detected and stopped.
B. there is minimal disruption to the organization’s
mission.
C. appropriate documentation about the event is
maintained as chain of evidence.
D. the affected systems are immediately shut off to limit
to the impact.
Answer: B
While the operations staff may be able to detect the attack and in
some cases the attackers, there is very little that the operations
staff can do to stop them.
All actions taken by the operations staff as they respond to handle
the security incident must follow established protocols and
documented, but this is not their primary objective. The affected
systems must only be shut off after necessary data or evidence that
will be admissible in court is collected. The best answer choice is
that the operations staff must maintain operational resilience.
Answer: A
Data management is a process involving a broad range of activities
from administrative to technical aspects of handling data. Good data
management practices include:
A data policy that defines strategic long-term goals and
provides guiding principles for data management in all
aspects of a project, agency, or organization.
Clearly defined roles and responsibilities for those
associated with the data, in particular of data providers,
data owners, and custodians.
Data quality procedures (e.g., quality assurance, quality
control) at all stages of the data management process.
Verification and validation of accuracy of the data.
Documentation of specific data management practices and
descriptive metadata for each dataset.
Adherence to agreed upon data management practices.
Carefully planned and documented database specifications
based on an understanding of user requirements and data to
be used.
Defined procedures for updates to the information system
infrastructure
(hardware, software, file formats, storage media), data
storage and backup
methods, and the data itself.
Ongoing data audit to monitor the use and assess
effectiveness of management practices and the integrity of
existing data. Data storage and archiving plan and testing
of this plan (disaster recovery).
Ongoing and evolving data security approach of tested
layered controls for reducing risks to data.
Clear statements of criteria for data access and, when
applicable, information on any limitations applied to data
for control of full access that could affect its use.
Clear and documented published data that is available and
useable to users, with consistent delivery procedures.
3. Issues to be considered by the security practitioner
when establishing a data policy include:
A. Cost, Due Care and Due Diligence, Privacy, Liability,
Sensitivity, Existing Law & Policy Requirements,
Policy and Process
B. Cost, Ownership and Custodianship, Privacy,
Liability, Sensitivity, Future Law & Policy
Requirements, Policy and Process
C. Cost, Ownership and Custodianship, Privacy,
Liability, Sensitivity, Existing Law & Policy
Requirements, Policy and Procedure
D. Cost, Ownership and Custodianship, Privacy,
Liability, Sensitivity,
Existing Law & Policy Requirements, Policy and Process
Answer: D
A sound data policy defines strategic long-term goals for data
management across all aspects of a project or enterprise. A data
policy is a set of high-level principles that establish a guiding
framework for data management. A data policy can be used to
address strategic issues such as data access, relevant legal matters,
data stewardship issues and custodial duties, data acquisition, and
other issues. Because it provides a high-level framework, a data
policy should be flexible and dynamic. This allows a data policy to
be readily adapted for unanticipated challenges, different types of
projects, and potentially opportunistic partnerships while still
maintaining its guiding strategic focus. Issues to be considered
by the security practitioner when establishing a data policy
include:
Cost – Consideration should be given to the cost of
providing data versus the cost of providing access to data.
Cost can be both a barrier for the user to acquire certain
datasets, as well as for the provider to supply data in the
format or extent requested.
Ownership and Custodianship – Data ownership should
be clearly
addressed. Intellectual property rights can be owned at
different levels; e.g. a merged dataset can be owned by
one organization, even though other organizations own
the constituent data. If the legal ownership is unclear, the
risk exists for the data to be improperly used, neglected,
or lost.
Privacy – Clarification of what data is private and what
data is to be made available in the public domain needs
to occur. Privacy legislation normally requires that
personal information be protected from others. Therefore
clear guidelines are needed for the inclusion, usage,
management, storage, and maintenance of personal
information in datasets.
Liability – Liability involves how protected an organization
is from legal recourse. This is very important in the area of
data and information management, especially where
damage is caused to an individual or organization as a
result of misuse or inaccuracies in the data. Liability is
often
dealt with via end-user agreements and licenses. A
carefully worded disclaimer statement can be included in the
metadata and data retrieval system so as to free the
provider, data collector, or anyone associated with the
dataset of any legal responsibility for misuse or inaccuracies
in the data. Sensitivity – There is a need to identify any
data which is regarded as sensitive. Sensitive data is any
data which if released to the public, would result in an
adverse effect (harm, removal, destruction) on the attribute
in question or to a living individual. A number of factors need
to be taken into account when determining sensitivity,
including type and level of threat, vulnerability of the
attribute, type of information, and whether it is already
publicly available.
Existing Law and Policy Requirements – Consideration
should be given to laws and policies related to data and
information as they apply. Existing legislation and policy
requirements may have an effect on the enterprise’s data
policy.
Policy and Process – Consideration should be given to
legal requests for data and policies that may need to be
put in place to allow for the timely processing of, and if
appropriate, response to the request. In addition, if one or
more policies already exist, then they have to be examined
and assessed to decide whether they will be sufficient, or
if they may need to be modified in some way to be fully
integrated with any new processes being created. The
policy and process used to provide access to data based
on a legal request have to be designed and implemented
in such a way that they do not violate access controls
and/or any existing policies that mandate how secure
access may be granted under such circumstances,
ensuring that only the data subject to the request is made
available, and not exposing any unrelated data.
4. The information owner typically has the following
responsibilities:
A. Determine the impact the information has on the
mission of the
organization, understand the replacement cost of the
information, determine who in the organization or
outside of it has a need for the information and
under what circumstances the information should be
released, know when the information is inaccurate or
no longer needed and should be archived.
B. Determine the impact the information has on the
mission of the organization, understand the
replacement cost of the information, determine who
in the organization or outside of it has a need for the
information and under what circumstances the
information should be released, know when the
information is inaccurate or no longer needed and
should be destroyed.
C. Determine the impact the information has on the
policies of the organization, understand the
replacement cost of the information, determine who
in the organization or outside of it has a need for the
information and under what circumstances the
information should not be released, know when the
information is inaccurate or no longer needed and
should be destroyed.
D. Determine the impact the information has on the
mission of the organization, understand the creation
cost of the information, determine who in the
organization or outside of it has a need for the
information and under what circumstances the
information should be released, know when the
information is inaccurate or no longer needed and
should be destroyed.
Answer: B
When information is created someone in the organization must be
directly responsible for it. Often this is the individual or group which
created, purchased or acquired the information to support the
mission of the organization. This individual or group is considered
the “information owner.” The information owner typically has the
following responsibilities:
Answer: A | C
QA/QC mechanisms are designed to prevent data contamination,
which occurs when a process or event introduces either of two
fundamental types of errors into a dataset:
Answer: A | B | D
Data documentation is critical for ensuring that datasets are useable
well into the future. Data longevity is roughly proportional to the
comprehensiveness of their documentation. All datasets should be
identified and documented to facilitate their subsequent
identification, proper management and effective use, and to avoid
collecting or purchasing the same data more than once. The
objectives of data documentation are to:
Answer: B
Data standards describe objects, features, or items that are
collected, automated, or affected by activities or the functions of
organizations. In this respect, data need to be carefully managed
and organized according to defined rules and protocols. Data
standards are particularly important in any situations where data
and information need to be shared or aggregated. Benefits of data
standards include:
more efficient data management (including
updates and security) increased data sharing
higher quality data improved data consistency
increased data integration better
understanding of data
improved documentation of information resources
Answer: D
Information classification refers to the practice of differentiating
between different types of information assets and providing some
guidance as to how classified information will need to be protected.
Vulnerability scans can be used to map out the computing
ecosystem. Threat modeling is used to identify threats and
vulnerabilities. Configuration management can be used to
determine the software baseline.
Answer: B
Information categorization also includes the processes and
procedures to lower the sensitivity label of information. For
example, declassification may be used to downgrade the sensitivity
of information. Over the course of time, information once
considered sensitive may decline in value or criticality. In these
instances, declassification efforts should be implemented to ensure
that excessive protection controls are not used for non-sensitive
information. When declassifying information, marking, handling,
and storage requirements will likely be reduced. Organizations
should have categorization or declassification practices well
documented for use by individuals assigned with the task.
Information may still be needed and so it cannot be destroyed,
degaussed, or deleted.
12. What are the FOUR phases of the equipment
lifecycle?
A. Defining requirements, acquiring and implementing,
operations and maintenance, disposal and
decommission
B. Acquiring requirements, defining and implementing,
operations and maintenance, disposal and
decommission
C. Defining requirements, acquiring and maintaining,
implementing and operating, disposal and
decommission
D. Defining requirements, acquiring and implementing,
operations and decommission, maintenance and
disposal
Answer: A
The following illustrates common activities that the information
security professional should engage in throughout the equipment
lifecycle:
Defining Requirements
Ensure relevant security requirements are included in
any specifications for new equipment
Ensure appropriate costs have been allocated for
security features required
Ensure new equipment requirements fits into the
organizational security architecture
Acquiring and Implementing
Validate security features are included as specified
Ensure additional security configurations, software
and features are applied to the equipment
Ensure the equipment is followed through any
security certification or accreditation process as
required Ensure the equipment is inventoried
Operations and Maintenance
Ensure the security features and configurations
remain operational
Review the equipment for vulnerabilities and mitigate
if discovered
Ensure appropriate support is available for security
related concerns
Validate and verify inventories to ensure equipment is
in place as intended
Ensure changes to the configuration of the system
are reviewed through a security impact analysis and
vulnerabilities are mitigated
Disposal and Decommission
Ensure equipment is securely erased and then either
destroyed or recycled depending on the security
requirements of the organization
Ensure inventories are accurately updated to reflect
the status of decommissioned equipment
Answer: C
Optical media such as CDs and DVD must be physically destroyed to
make sure that there is no residual data that can be disclosed. Since
the media mentioned in this context is a read-only media (burn-
once) DVD, the information on it cannot be overwritten or deleted.
Degaussing can reduce or remove data remanence in magnetic non-
optical media.
15. Which of the following processes is concerned with
not only identifying the root cause but also
addressing the underlying issue?
A. Incident management
B. Problem management
C. Change management D. Configuration management
Answer: B
While incident management is concerned primarily with managing
an adverse event, problem management is concerned with tracking
that event back to a root cause and addressing the underlying
problem. Maintaining system integrity is accomplished through the
process of change control management. Configuration management
is a process of identifying and documenting hardware components,
software, and the associated settings.
Answer: C
Prior to deploying updates to production servers, make certain that
a full system backup is conducted. In the regrettable event of a
system crash, due to the update, the server and data can be
recovered without a significant loss of data. Additionally, if the
update involved propriety code, it will be necessary to provide a
copy of the server or application image to the media librarian. The
presence or absence of full disclosure information is good to have
but not a requirement as the patching process will have to be a
risk-based decision as it applies to the organization. Documentation
of the patching process is the last step in patch management
processes. Independent thirdparty assessments are not usually
related to attesting patch validity